File tree Expand file tree Collapse file tree 1 file changed +33
-0
lines changed
org-formation/075-security-hub Expand file tree Collapse file tree 1 file changed +33
-0
lines changed Original file line number Diff line number Diff line change @@ -354,6 +354,8 @@ Resources:
354354 # Below this point, rules are defined to send findings to the SecurityHubFindingsQueue above
355355 # The findings on the queue will be processed by a lambda that will suppress them in SecurityHub
356356
357+ # Event format: https://docs.aws.amazon.com/securityhub/latest/userguide/securityhub-cwe-event-formats.html
358+
357359 # This rule suppresses findings for the given controls (GeneratorId) in all the accounts
358360 SuppressFindingsInAllAccountsRule :
359361 Type : AWS::Events::Rule
@@ -496,3 +498,34 @@ Resources:
496498 - SecurityHubFindingsQueue
497499 - Arn
498500 Id : Target0
501+
502+ # Suppress all findings for insecure access to S3 buckets in the bridge accounts
503+ # because consent forms are accessed via HTTP
504+ SuppressFindingsForBridgeAccounts :
505+ Type : AWS::Events::Rule
506+ Properties :
507+ Description : SecHubSuppress findings for HTTP access in Bridge
508+ EventPattern :
509+ detail :
510+ findings :
511+ GeneratorId :
512+ # Ensure S3 Bucket Policy is set to deny HTTP requests
513+ - ' cis-aws-foundations-benchmark/v/1.4.0/2.1.2'
514+ Workflow :
515+ Status :
516+ - NEW
517+ - NOTIFIED
518+ account :
519+ - ' 420786776710' # bridge-dev
520+ - ' 649232250620' # bridge-prod
521+ detail-type :
522+ - Security Hub Findings - Imported
523+ source :
524+ - aws.securityhub
525+ State : ENABLED
526+ Targets :
527+ - Arn :
528+ Fn::GetAtt :
529+ - SecurityHubFindingsQueue
530+ - Arn
531+ Id : Target0
You can’t perform that action at this time.
0 commit comments